@dblp

Trust games: How game theory can guide the development of hardware Trojan detection methods.

. HOST, page 91-96. IEEE Computer Society, (2016)

Links and resources

Tags